2. Introduction:
Authentication is one of the most important security
service provided to system by the different
authentication schemes or algorithms.
To protect any system authentication must be provided,
so that only authorized persons can have right to use or
handle that system & data related to that system
securely.
There are many authentication algorithms are available
some are effective & secure but having some drawback.
Previously there are many authentication techniques
were introduced such as Graphical password, Text
password, Biometric authentication, etc.
4. Common Authentication
Techniques:
Textual Passwords
(Recall Based)
Recall what you
have created
before.
Biometric
schemes
(fingerprints,
voice recognition
etc)
Graphical
Passwords:
(Recall Based+
Recognition
Based)
5. Drawbacks of existing
system
Current authentication suffer from many weakness.
Textual are commonly used, users tends to use
meaningful words from dictionaries, which
makes textual passwords easy to break.
Smart cards can be stolen.
We rarely use Biometric scheme because it has some draw
backs
Like(HW COST IS MORE)
6. What is 3D PASSWORD?
It is the collected user actions and
interactions in the 3D virtual
environment construct the 3D password
7. 3D PASSWORD SCHEME
The 3D Password scheme is a new authentication scheme that
combine
RECOGNITION
+ RECALL
+TOKENS
+BIOMETRIC
(In one authentication system)
8. Objectives of 3D
PASSWORD
To provide more secure authentication
technique than existing one.
To design and develop user friendly and
easier authentication scheme as single
system.
To overcome the drawbacks and
limitations of previously existing system
(textual password, graphical password
etc.)
New scheme should be combination of
recall-recongnition ,biometrics and token
based authentication schemes.
9. 3D Password Selection
Virtual objects can be any objects we encounter in real life:
A computer on which the user can type
A fingerprint reader that requires users fingerprint
A paper or white board on which users fingerprint
A Automated teller (ATM) machine that requires a
token
A light that can be switched on/off
A television
A car that can be driven
A graphical password scheme
10. 3D Passwords
Differentiators
• FLEXIBILITY:
3D password allows multifactor's authentically
biometric, textual password can be embedded in 3D
password technology.
• STRENGTH:
This scenario provides almost unlimited password
possibility.
• RESPECT OF PRIVACY:
Organizers can select authentication schemes that
respect users privacy.
11. Advantages of 3D -
PASSWORD
It provides security.
It can’t be taken by another person.
3D graphical password has no limits.
Password can be change easily whenever we
want.
It helps to keep lots of personal details.
13. Attacks and
Countermeasures
Brute Force Attack: The attack is very difficult
because
i. Time required to login may vary form 20s to 2 min
therefore it is very time consuming.
ii. Cost of Attack: A 3D virtual environment may
contain biometric information.
Well studied Attack: Attackers tries to get the most
probable distribution of 3D password.
(This is difficult because attacker has to perform
customized attack to different virtual environment)
14. Attacks and
Countermeasures Cont..
Shoulder surfing attacks:
Attackers uses camera to record the users
3D PASSEORDS , it is more successful.
Timing attack:
The attackers observes how long it takes the
legitimates user to perform correct log in using 3D
PASSWORDS length.(This attack can’t be
successful since it gives the attacker the multiple
hints)
15. Conclusion
• The authentication is approved by 3D
PASSWORD ,because the un-authorized
person may not interact with same object at a
particular location.
• It is much difficult to crack , because it has no
fixed no of steps and a particular procedure.
• The 3D-PASSWORD is unbreakable.